Sunday, May 29, 2011

Review Questions from Chapter 11 "DoD Security Clearances and Contracts Guidebook"

If you are a defence contractor, cleared contractor or cleared employee, try these questions. Want more, see http://www.redbikepublishing.com

1. The vice president of business development has just brought up the wonderful opportunity of selling an all weather capability the company produces for medical evacuation flights to a foreign owned company. 

a. Suppose this item needs a license prior to export. Describe the first step an organization would take in consideration of a possible export.

b. If the item is to be delivered to a foreign company just down the street, will export requirements still apply?


2. You are travelling as an authorized courier to deliver a package that contains classified information at the CONFIDENTIAL level. Upon arrival, the foreign government customs agent wants to take custody of the package. You present your credentials and attempt to talk her out of the idea. She informs you that as a representative of the foreign government, she is authorized to accept the delivery. Is she correct? Why or why not?

3. As an FSO, you have many responsibilities including approving classified visits. A program manager enters your office and informs you that his foreign customer wants to send an employee to perform at your location on a classified project. The program manager requests that you draw up a sample visit request form that the foreign company can use to submit a visit request. Is this the proper request procedure? Why or why not?

4. In the same situation as question three, the visit has been authorized through appropriate channels. Since your cleared facility handles many classified contracts, you want to ensure the visitor does not gain access to classified and unclassified items not authorized for export. What will you produce to ensure the visitor and company employees remain in compliance with export laws?

a. Which agency has jurisdiction over commercial and dual-use items?

b. Which regulation covers commercial and dual-use items?

c. Which regulation governs the export of defense articles?

5. Your organization has an opportunity to perform a modification of a foreign government weapons platform. You will not be selling an item, but modifying the platform for a radio mount. If awarded the contract, your company will send a team to the foreign country to perform the services over the next few years. What type of request will you submit? Who is the approving agency?



      From "DoD Security Clearance and Contracts Guidebook" Not to Readers



      The defense industry is booming and cleared contractors are benefiting. Those who know how to execute classified contracts are in demand. Additionally, the Departments of Defense, Department of Energy, the Nuclear Regulatory Commission, Central Intelligence Agency and many other Federal and supporting contractors are in great need of experienced and qualified security specialists, managers and Facility Security Officers. As the industry becomes more demanding and positions more competitive, today’s security specialists need to be on top of their game.

      Go beyond the Presidential Executive Orders and the National Industrial Security Program Operating Manual. Being technically proficient is great, but building an award winning security program gets you noticed. Make the move from being an administrator to becoming the "go to" security manager. Learn everything you can to better understand what it takes to get security clearances and move to the next step of protecting classified information.

      Saturday, May 7, 2011

      Training Topics for Cleared Contractor FSOs

      Our Newest Book
      New cleared contractors should understand that the Defense Security Service (DSS) provides initial training and special briefings to their appointed Facility Security Officer (FSO). This training is invaluable as the new FSO will have a chance to learn about their responsibilities. Sometimes the new FSO will be learning for the first time exactly what is expected of them. After training, the FSO is then authorized to present the training to the organization's cleared employees. According to NISPOM, the FSO is also required to attend the DSS mandated FSO Program Management Course within one year of appointment. This means that cleared contractors should be prepared to send a designated FSO to the DSS Academy for the training, or take the training on line. Either way, the FSO must be certified.
      DSS provides new courses designed for FSOs of possessing and non-possessing facilities. FSOs should coordinate with their DSS representative to determine the training that’s right for their situation. The training is designed to prepare the FSO to implement and direct a NISPOM based security program in their cleared contractor facility including, but not limited to the following topics:

      Protecting classified material – The proper receipt, accountability, storage, dissemination and destruction of classified material.

      Required training – This instruction helps the FSO establish an ongoing training program designed to create an environment of security conscious cleared employees.

      Personnel security clearances – The FSO gains an understanding of the personnel security clearance request procedure, briefing techniques and maintenance of personnel clearances.

      Facility clearance – The FSO learns how FCLs are established and which records and activities are required to maintain the FCL.

      Foreign Ownership Control and Influence (FOCI) - Organizations analyze foreign investments, sales and ownership on a regular basis using the Certificate Pertaining to Foreign Interests (SF 328). FSOs learn to interact with management and provide guidance and direction in preventing a foreign entity from unauthorized access to or controlling work involving classified and export controlled information.

      Exports compliance and international operations –FSOs receive instruction on how to prevent unauthorized disclosure of critical technology, classified and export controlled information.

      Restricted areas – The restricted area is established to control temporary access to classified material.

      Closed areas – Space is approved to store and work with classified material. This involves approved construction and limited accesses controls to prevent unauthorized disclosure during and after work hours.

      Contract security classification specification (DD Form 254) –The cleared contractor is allowed access to classified contracts based on the DD Form 254. The FSO would learns how the DD Form 254 is constructed and how to provide input to better meet security requirements.

      Security classification guides (SCG) – As the DD Form 254 provides authorization to execute a classified contract, the SCG provides the “how to” instruction.

      Security administration and records keeping – This teaches the maintenance of facility and personnel security clearance information as well as all other accountability. The FSO is expected to provide information on personnel clearances, original documentation of their facility clearance and demonstrate classified information accountability during the DSS annual security inspection.

      Sub contracting – When approved to subcontract classified work, the prime contractor will provide a DD Form 254 to the subcontractor.

      The academy issues a certificate which should be filed for presentation during security audits. The FSO training should not end with this course. Career enhancing training is available through various security and management courses. More in depth online and residence training is available in each above mentioned topic. Other agencies may offer more training certification in special access programs, COMSEC, and intelligence protection. Other training is available in colleges, professional organizations, vendor websites, through books like this and within the security community.

      Tuesday, April 26, 2011

      Why I wrote ISP Certification-The Industrial Security Professional Exam Manual


      Excerpt from the tentatively titled book "Get Rich in a Niche-Writing and Publishing for Small Industries"

      A familiar saying, “Necessity is the Mother of Invention” describes that a need comes before a product. Someone recognized a lack of a product or item and without successfully finding satisfaction, they invented a product themselves. Many become wealthy and famous providing what they themselves found the world to lack. I have helped other professionals by providing practice tests and boosting the confidence of others who desire a security certification. Before I took my certification exam, I looked around for leadership. I found a small study group, however, it was up to me to study for and pass the examination. Because there was lots of encouragement, but not much leadership in the area, I began to invent my own study program.


      Many of my ideas were not conventional in the specialized security market. However, I had learned from college, previous military and life experience, how to set goals and establish a way to reach those goals. With a lack of publication in the area, I went about touching, experiencing, and researching everything I could about the certification. I volunteered for extra jobs at work (related to the certification) and took notes of my progress.

      I also read reviews of the test and articles about who passed the test and what they did to study. Most who had failed had done so because they ran out of time. Since the certification exam has a two hour time limit for 110 questions, I knew that my priority was to find the answers quickly. When the day came, I took the test and finished in plenty of time. I realized that I held a key to passing the test and knew that I could share it with others. Where others ran out of time, I found a way to beat the clock. My book continues to not only encourage others to take the exam, but to pass. The reviews on Amazon.com testify to my unconventional approach to the test taking. My premise is that the professionals already know the material, and I can show them how to organize studying to successfully pass the test.

      And that’s the point. There was a problem and I knew I had the solution. Others continue to write to me as well as post positive comments about my book. To date, I still have no serious competition, but others are arriving to the market. I just have to stay on top. My publications allow professionals to focus on their careers, knowing I will provide quality niche related publications.

      Saturday, April 16, 2011

      Industrial Security Newsletter - iContact Community


      Our Newsletter

      Great Articles on Improtant NISPOM Topics:

      Clean Desk Policy
      Information Management Systems
      Reproducing Classified Information
      Upcoming Security Books

      Check the NISPOM newsletter Industrial Security Newsletter - iContact Community

      Friday, April 8, 2011

      Clean Desk Policy

      
      NISPOM is for all cleared employees
      
      Simple Solutions

      
      Simple acts such as maintaining a clean desk policy has helped reduce security violations. In this situation, an employee removes everything from the tops of their working surfaces or desks except for the classified material. That simple practice could make a busy employee more aware that any articles on the desk requires extra diligence and must never be left unattended. When no longer needed, classified information should be locked up in a security container or closed area. If a desk is empty, the cleared employee can also assume that there are no classified items out. This discipline creates an environment that reduces the chances of the employee leaving a classified item vulnerable to compromise if they forget to secure it prior to taking a break or leaving for the day. Also useful is the posting of a desk tent and door hanger with an important reminder that classified items are left out. As the employee leaves their work area, they will encounter the warnings on their desk or door handle.


      Thursday, April 7, 2011

      Information Management Systems

      Commerically available IMS use information technology to create a detailed database that helps FSOs track classified material through many dispositions from receipt, inventory requirements and final disposition. Some produce receipts, tie to a barcode scanner, report statistical data that can help determine use and much more. For example, if an inventory reveals missing classified information, the database can provide valuable information to help reconstruct the classified information’s history.

       
      Databases can be tied to scanner software. Barcodes can be printed and applied to classified items for scanning. If an item is destroyed, shipped, filed, loaned or returned, it can be scanned and the status updated. These databases provide reports identifying when and where the barcode on the classified document was scanned and the last disposition. The FSO can use the technology to research dates, methods of receipt, contract number, assigned document number, assigned barcode, title, classification, copy number, location, and name of the receiver as follows:

      •  Date of Receipt or Generation-This information is recorded to indicate the day the document arrived. It can be used as the countdown date for an inventory requirement or as a timeline or search method in case an employee needs to retrieve it. If a document cannot be easily traced, those conducting the inventory can use the date in reference to narrowing down search locations or options
      • How Received-Did the classified item arrive through USPS mail, overnight delivery, courier, hand carry, electronic means, derived from other research, printed or duplicated? This information is important to the FSO for use during DSS’s annual review.
      • Contract Number-Contract numbers are important in situations where a contractor may have hundreds of classified contracts including directions that the material classified at certain levels must be stored separately. This added column can assist with determining need to know, quick retrieval of receipts, records or the classified item itself. Additionally, the FSO can pull documents by contract number to return to customer during contract closeout.
      • Document Number-Cleared contractors operating an IMS can generate an internal document number for classified information entering the company.
      • Barcode-The barcode is an excellent tool for document filing, retrieval, inventory and internal tracking for cleared contractors with large inventories of classified information.
      • Unclassified Title-Unclassified titles should be used. If a receipt arrives with a classified title, the receipt will have to be protected as classified. If an unclassified title is not possible or desired, arrangements will have to be made to protect all records and receipts with the classified information annotated. The classified title cannot be put on an unclassified database.
      • Classification Level-Data with the classification identified helps during the retrieval process. Classified information with the additional designations or caveats of: FGI, NOFORN, INTEL, NATO and others should be filed separately according to regulations and contract requirements.
      • Copy Number-Copy numbers are used for multiple copies of existing classified material. For example, five copies of the same type of classified document could arrive or be duplicated on site. For example, XYZ Contractor number’s their documents sequentially. Document number 35601-02 is the 35,601st document entered into the system. Additionally, the -02 identifies it as the second copy of that document.
      • Location or Disposition-The exact location of classified material helps with the easy retrieval. To log a document into accountability with no location is fine for companies possessing a limited amount of documents. Those contractors or agencies with multiple documents and possible locations will want to identify the assignment for quick retrieval. An additional data field can be used to input shelf, GSA container, room or building number. 

       FSOs may also want to track the use of classified information checked out of a central location. This is similar to what a library does. Tracking the check out dates can help reconstruct where and when a document is used to find lost documents, help enforce need to know and provide better document control.